Results 51 to 60 of about 404,854 (339)
Benchmark Tests for the Model-Checking-Based IDS Algorithms
A fundamental concern for the security community is to identify the comprehensive comparable performance of various intrusion detection algorithms which are based on the Model Checking (MC) techniques. To address this open issue, we conduct the benchmark
Miaolei Deng+4 more
doaj +1 more source
Illegal Intrusion Detection of Internet of Things Based on Deep Mining Algorithm
In this study, to reduce the influence of The Internet of Things (IoT) illegal intrusion on the transmission effect, and ensure IoT safe operation, an illegal intrusion detection method of the Internet of Things (IoT) based on deep mining algorithm was ...
Xingjuan Fan+4 more
doaj +1 more source
Open Set Dandelion Network for IoT Intrusion Detection [PDF]
As IoT devices become widely, it is crucial to protect them from malicious intrusions. However, the data scarcity of IoT limits the applicability of traditional intrusion detection methods, which are highly data-dependent. To address this, in this paper we propose the Open-Set Dandelion Network (OSDN) based on unsupervised heterogeneous domain ...
arxiv
Identification of novel small molecule inhibitors of ETS transcription factors
ETS transcription factors play an essential role in tumourigenesis and are indispensable for sprouting angiogenesis, a hallmark of cancer, which fuels tumour expansion and dissemination. Thus, targeting ETS transcription factor function could represent an effective, multifaceted strategy to block tumour growth. The evolutionarily conserved E‐Twenty‐Six
Shaima Abdalla+9 more
wiley +1 more source
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever+1 more
wiley +1 more source
High-speed railway perimeter intrusion detection approach based on Internet of Things
Efficient perimeter intrusion detection approach is vital to safety management of China high-speed railway. In this article, for high-speed railway perimeter intrusion detection problem, a perimeter intrusion detection framework based on Internet of ...
Zhengyu Xie, Yong Qin
doaj +1 more source
Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren+16 more
wiley +1 more source
In order to cope with ever-evolving and increasing cyber threats, intrusion detection systems have become a crucial component of cyber security. Compared with signature-based intrusion detection methods, anomaly-based methods typically employ machine ...
Haonan Tan+3 more
doaj +1 more source
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink+6 more
wiley +1 more source
Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to ...
Bazara I. A. Barry, H. Anthony Chan
openaire +4 more sources